Cryptographic Hash Standards: Where Do We Go from Here?

Successful attacks against the two most commonly used cryptographic hash functions, MD5 and SHA-1, have triggered a kind of
feeding frenzy in the cryptographic community. Many researchers are now working on hash function attacks, and we can expect
new results in this area for the next several years. This article discusses the SHA-1 attack and the US National Institute
of Standards and Technology's (NIST's) plans for SHA-1 and hash functions in general.